Index: net/cert/ct_verifier.h |
diff --git a/net/cert/ct_verifier.h b/net/cert/ct_verifier.h |
deleted file mode 100644 |
index 290a0474a649138733c902fdc5a8e47b6210f12d..0000000000000000000000000000000000000000 |
--- a/net/cert/ct_verifier.h |
+++ /dev/null |
@@ -1,43 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef NET_CERT_CT_VERIFIER_H_ |
-#define NET_CERT_CT_VERIFIER_H_ |
- |
-#include "net/base/net_export.h" |
- |
-namespace net { |
- |
-namespace ct { |
-struct CTVerifyResult; |
-} // namespace ct |
- |
-class BoundNetLog; |
-class X509Certificate; |
- |
-// Interface for verifying Signed Certificate Timestamps over a certificate. |
-class NET_EXPORT CTVerifier { |
- public: |
- virtual ~CTVerifier() {} |
- |
- // Verifies SCTs embedded in the certificate itself, SCTs embedded in a |
- // stapled OCSP response, and SCTs obtained via the |
- // signed_certificate_timestamp TLS extension on the given |cert|. |
- // A certificate is permitted but not required to use multiple sources for |
- // SCTs. It is expected that most certificates will use only one source |
- // (embedding, TLS extension or OCSP stapling). If no stapled OCSP response |
- // is available, |stapled_ocsp_response| should be an empty string. If no SCT |
- // TLS extension was negotiated, |sct_list_from_tls_extension| should be an |
- // empty string. |result| will be filled with the SCTs present, divided into |
- // categories based on the verification result. |
- virtual int Verify(X509Certificate* cert, |
- const std::string& stapled_ocsp_response, |
- const std::string& sct_list_from_tls_extension, |
- ct::CTVerifyResult* result, |
- const BoundNetLog& net_log) = 0; |
-}; |
- |
-} // namespace net |
- |
-#endif // NET_CERT_CT_VERIFIER_H_ |